Secure forms for chat user guide

Secure forms is designed to provide an additional security layer that enables consumers to provide sensitive information in full confidence
  • Chat

LivePerson invests heavily in providing the most secure platform possible for our services, customers, and their data. As veterans in the field, we understand that security is paramount in correspondence between agents and consumers and requires a heightened level of protection. The Conversational Cloud secure form was specifically designed to provide the additional security layer that enables consumers to be able to provide their sensitive information (such as Cardholder Data /CHD, social security number, and other Personal Identifiable Information/PII) in a highly secure environment.

Secure forms are supported both on desktop and mobile web.

The benefits

The LivePerson secure form provides brands with an enhanced engagement experience with the following benefits:

  • Extra secure interaction: The secure form dedicates a "secure tunnel" within the standard chat for exchanging Personal Identifiable Information (PII), Cardholder Data (CHD), and other sensitive identity validation data like answers to verification questions and PINs. Agents continue to operate in the same Agent Workspace environment as data is sent from the visitor to the agent in a safe, PCI compliant interaction.
  • No storage of sensitive data in chat transcripts: Data processed by the secure form is not stored as part of the standard chat transcripts and cannot be retrieved through the application after the chat session has ended. The data is securely stored in its tokenized form in a dedicated database.
  • Off the record questions (CVV): The Conversational Cloud secure form offers the option of "off the record” or CVV verification questions. In both cases, the visitor’s answers are not stored anywhere (not even in tokenized form), and are only available to the agent in real time. This question type can be used for asking the visitor CVV information in a secure PCI compliant manner.

European security standards

LivePerson works hard to ensure that our customers around the world can safely and securely use our platform. There are several different standards for protecting data around the world. LivePerson meets the following international standards for data protection, ensuring that our European customers can safely use our secure forms:

  1. Standard 1: PCI-DSS 4.0
    LivePerson complies with Payment Card Industry Data Security Standards (PCI DSS) 4.0 for it’s Secure Form Widget and Billing system. To view the file for the LP AOC, titled LivePerson 2024 PCI-DSS Attestation of Compliance, click here.
  2. Standard 2: GDPR
    LivePerson has worked to ensure compliance with the EU General Data Protection Regulation (GDPR). Please read more on the LivePerson website.

When to use secure forms?

Some of the most common use cases for the secure form include:

  • Visitors need to provide their credit card information to an agent.
  • Visitors need to provide their CVV number to an agent.
  • Visitors need to provide PII to an agent as part of the identity validation process, for example, to answer a secret question.
  • Any other situation requiring the visitor to send sensitive information to the agent.

PCI-DSS compliance

The LivePerson secure form is specifically designed to comply with the strict requirements of the Payment Card Industry Data Security Standards (PCI-DSS). The form was developed under the guidance of a Qualified Security Assessor (QSA) and a dedicated PCI-DSS environment hosts the secure form system components.

Following the completion of an onsite assessment, the Conversational Cloud secure form environment has been officially certified as compliant with the requirements of a Level 1 Service Provider PCI-DSS (version 4). Attestation of Compliance (AOC) can be provided upon request.

How it works

An agent can send a secure form from the Agent Workspace at any time during a chat session by clicking the secure form tab in the predefined content widget and selecting a secure form.

The visitor then fills out and submits the secure form back to the agent. The receiving agent is the only one able to view the information sent by the visitor.

If there are other agents viewing the chat, they will not be able to view the secure form. In addition, agents who receive a transferred or reassigned chat will not be able to view the secure form. Only the agent who sent the form can access the submitted form.


Fully Accessible visitor experience

The secure form widget complies with ADA and WCAG 2.0 AA disability accessibility requirements. This applies to both the desktop and mobile web (iOS and Android) and includes:

  • Screen reader support: secure forms can be filled out using screen readers for visually impaired visitors.
  • Keyboard operable: secure forms can be operated without the use of a mouse for visitors with motor function and/or visual impairments.
  • Improved error handling: Clear error indication and suggested fixes.

Data flow

Tokenization is a method of substituting data to render it meaningless to anyone gaining unauthorized access. The tokenization processes implemented in the secure form environment is based on a technology manufactured by a leading provider of tokenization solutions. The sensitive data submitted in the secure form is sent from the visitor to the agent via the PCI-DSS certified environment. A dedicated PCI compliant server handles the tokenization of the sensitive information and validates agent authorization before delivering the visitor-submitted secure form.

The following diagram shows the process and security layers of a visitor completing a secure form and sending it to an agent.

Figure 3: Secure form visitor to agent flow chart

Below is a detailed explanation of the flow of the diagram above:

  1. The agent sends a secure form with a one-time token (OTK) for retrieval.
  2. The visitor receives the secure form using the OTK and submits it using a different OTK.
  3. The data is tokenized. The tokenized data is not legible by anyone outside the service, and moreover, the token is assigned to a specific action in the environment. For example, you cannot use a submit data OTK to retrieve data.
  4. The data is stored in its tokenized form in a dedicated database and is represented by a Universally Unique Identifier (UUID). This means that the tokenized data is never directly accessible to any client outside of the LivePerson environment. Rather, the client receives the UUID and requests the data from the PCI environment. "Off the Record" data (CVV) is not stored in the database, but is stored in memory for a short period of time. After this time period, the agent will need to resend the form in order to access this information.
  5. The UUID along with another OTK is sent to the agent.
  6. The agent retrieves the form via the OTK and UUID.
  7. The service detokenizes the data and sends it back to the agent.

Security measures

The secure form solution was designed with strict security parameters to help ensure sensitive customer information is sent only to the appropriate, authorized agent (these controls are in addition to the standard controls required by PCI-DSS). The following controls have been implemented as part of the solution:

  • Data sent from the visitor by means of the secure form undergoes a tokenization process.
  • Access to the tokenized data requires authentication and session validation.
  • A unique one-time key (OTK) is utilized for each form initiated by an agent. Each OTK can only be used once and is valid for a very short period of time (seconds).
  • One-time-keys undergo validation and verification during the data de-tokenization process.
  • The visitor's OTK can only be used for tokenizing the data. The agent's OTK can only be used for detokenizing the data. Moreover, an OTK is specific to one site. This ensures that the OTK cannot be inappropriately manipulated.
  • The sensitive data is only accessible during the active session. It is not stored in the chat history or transcripts.
  • The tokenized data is securely stored in the LivePerson application database in its tokenized form for a default period of 13 months. Currently, the application does not provide access to retrieve the tokenized data.

Supported browsers

Refer to system requirements for information about supported browsers.

Considerations when using secure forms

When using secure forms, bear in mind:

  • Submitting CVV (Card Verification Value) or CVC (Code Verification Certificate) data should only be performed in CVV question type or questions that are marked as "Off the Record".
  • Data submitted in the secure form is only retrievable for the duration of the session it was submitted in.
  • Agent workstations utilized for viewing secure forms are in-scope of PCI-DSS certification.
  • LivePerson accounts password and login policy must be enabled and configured according to PCI-DSS requirements.

Accessing the same form multiple times:

This option is configurable. If required, brands can define how many times a consumer will be able to reopen the same secure form prior to submitting it.

This is useful for brands to allow consumers to broswe back and forth different pages (e.g. collecting customer ID) during the conversation while filling out the secure form while keeping it accessible.
In order to configure, please contact your LivePerson account team.

Setting up secure forms

Secure forms are configured by LivePerson. To enable this feature, please contact LivePerson customer support or your account team. Your LivePerson account team will work with you to make the necessary adjustments to your account settings and configurations.

Account setup

Once secure form features have been enabled on your account, you will need to setup your account for secure forms. The following parameters will need to be configured in order for secure forms to work on your account; if you require different account settings, please discuss this with your LivePerson account team. 

The account password policy can be configured via the Management Console in the Account Access Control. The password policy is as follows:

  •  Password change policy must be set to 90 or less than 90 days.
  • Password strength must be set with one of the following options “good“, “fair“ or “excellent“.
  • Password history should be set to 4 or more than 4.
  • If you are applying higher password strength than before, you need to click “reinforce password rule“to apply the new policy, and the user will be asked to change his password on the next login to match the new rule. (Optional)

Permission settings

The following permissions related to secure forms need to be enabled for an account:

RolePermissionPermission definitionDefault State (role)
AgentUse secure form within a conversationFor brands who have enabled the secure forms feature, this permission allows the Agent to use the form within a conversationOn

The following permission for agent managers also relates to secure forms, but does not need to be enabled unless you wish Agent Managers to be able to view secure form responses in the conversation history.

RolePermissionPermission definitionDefault State (role)
Agent ManagerView secure form responses in Conversation HistoryFor brands who have enabled the secure forms feature, this permission allows the Agent Manager to view all secure form responses in the Conversation HistoryOff

To verify that permissions are enabled:

  1. In the users tab, click on the profiles page.
  2. Click on the ‘agent’ profile. The edit profile page will open.
  3. Under permissions, scroll down to confirm that the ‘use secure form within a conversation’ permission is enabled.
  4. Click save.

If a you would like to enable the secure forms permission for some agents, but not for others, this can be achieved by creating a new custom profile within the agent role. For further information, refer to the customize user profiles documentation.

Missing Something?

Check out our Developer Center for more in-depth documentation. Please share your documentation feedback with us using the feedback button. We'd be happy to hear from you.